簡易檢索 / 詳目顯示

研究生: 林政誼
Lin, Cheng-Yi
論文名稱: 基於檔案區域性及內容資訊之複合式檔案貯藏方法
A hybrid file hoarding scheme based on file locality and content information
指導教授: 謝錫堃
Shieh, Ce-Kuen
莊宜璋
Zhuang, Yi-Chang
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 74
中文關鍵詞: 內容資訊檔案區域性離線操作貯藏行動運算
外文關鍵詞: content information, file locality, disconnected operation, mobile computing, Hoarding
相關次數: 點閱:67下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在行動運算的環境裡,使用者通常都會使用行動裝置經由無線網路來存取遠端的檔案。然而,常常使用者會遇到一些網路的限制因而無法存取到遠端自己所需要的檔案,例如:防火牆、不穩定的網路狀況、網路斷線…等等惡劣的網路環境。一旦使用者遇到這些情況,他們可能會被迫停止手上目前的工作,直到他們能找到可使用的網路資源以及獲取所需的檔案為止。因此如果使用者擁有一個工具在網路環境良好的情況下,幫他們預先儲存未來可能會用到的檔案在行動裝置上,即使使用者在之後遇到這些惡劣的網路狀況,仍然可以在行動裝置上存取到自己想要的檔案。我們提出了一個複合式檔案貯藏方法,這個方法利用檔案區域性以及內容資訊來建立檔案彼此之間的關係,並利用這些資訊來預測使用者未來會使用的檔案進而預存重要的檔案。透過這樣檔案的預存機制,不但可以解決使用者處於惡劣的網路環境無法存取到遠端檔案的窘境,更能夠減少遠端傳輸所需要等待的時間和花費的資源 (如:電力消耗)。

    In mobile computing environment, mobile users usually use their mobile devices to access remote data via wireless network. However, mobile users are unavoidable to face up the situation of network-related constraints such as firewall, weak connection, and even complete disconnection. Once mobile users are in these surroundings, they might not access the necessary remote data and be forced to postpone their jobs. Therefore, it is critical for mobile users to have an automatic file hoarding scheme to preload necessary data into local storage before disconnected from the networks. We propose a hybrid file hoarding scheme to assist mobile users to load the files that the users might need in disconnected mode. The hybrid file hoarding scheme combines file locality and content information to predict the file set used during disconnections. The hybrid file hoarding scheme not only help users to access remote data in disconnected mode but also reduce access latency and transmission costs of remote access via the networks.

    Chapter 1 Introduction....1 Chapter 2 Background and Related Works....8 2.1 Background....8 2.2 Related Works....10 2.2.1 SEER....10 2.2.2 Ubidata....11 2.2.3 Successor Model....12 Chapter 3 System Design....16 3.1 File Relationships....19 3.1.1 File Locality....19 3.1.1.1 Relation Window....19 3.1.1.2 File Location....22 3.1.2 Content Information....23 3.2 File Selection....27 3.3 Initial Hoarding File....30 Chapter 4 Implementation....32 4.1 System Architecture....33 4.2 Hoard Agent....34 4.3 File Access Monitor....35 4.4 File Relationships....36 4.4.1 Relation Window....36 4.4.2 File Location....36 4.4.3 Content Information....37 4.5 DBMS and Relation Database....39 4.6 File Selection and Transmission....39 Chapter 5 Performance Evaluations....41 5.1 Experimental Environment and Initialization....41 5.2 Comparison of file hoarding schemes of temporal locality....44 5.2.1 Comparison of successor_model and successor_model_undirected....44 5.2.2 Comparison of successor_model and relation window....49 5.3 Hybrid file hoarding scheme....55 Chapter 6 Conclusions and Future Work....65 6.1 Conclusions....65 6.2 Future work....66 References....71

    [1]J. J. Kistler and M. Satyanarayanan, Disconnected operation in the Coda file system. ACM Transactions on Computer Systems, 10(1):3-25. ACM Press,February 1992..
    [2]M. Satyanarayanan, The evolution of Coda, ACM Transactions on Computer Systems (TOCS), v.20 n.2, p.85-124, May 2002
    [3]G. H. Kuenning, The Design of the SEER Predictive Caching System, Proceedings of the Workshop on Mobile Computing Systems and Applications, Santa Cruz, California, December 1994
    [4]G. H. Kuenning, Seer: Predictive File Hoarding for Disconnected Mobile Operation. PhD thesis, University of California, Los Angeles, Los Angeles, CA, May 1997.
    [5]G. H. Kuenning, and Gerald J. Popek, Automated hoarding for mobile computers, ACM SIGOPS Operating Systems Review, v.31 n.5, p.264-275, Dec. 1997.
    [6]G. H. Kuenning, Wilkie Ma, Peter Reiher, and Gerald J. Popek, Simplifying automated hoarding methods, Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, September 28-28, 2002.
    [7]Craig A. N. Soules, and Gregory R. Ganger, Connections: using context to enhance file search, Proceedings of the twentieth ACM symposium on Operating systems principles, October 23-26, 2005.
    [8]Sumi Helal, Joachim Hammer, Jinsuo Zhang, and Abhinav Khushraj, A Three-Tier Architecture for Ubiquitous Data Access, Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications, p.177, June 25-29, 2001.
    [9]Jinsuo Zhang, Abdelsalam (Sumi) Helal, and Joachim Hammer, UbiData: ubiquitous mobile file service, Proceedings of the 2003 ACM symposium on Applied computing, March 09-12, 2003.
    [10]G. M. Sur and J. Hammer, Management of user profile information in UbiData, Dept. of CISE, University of Florida, Gainesville, FL, Technical Report TR03-001, January 2003.
    [11]Helal, A. and Hammer, J. UbiData: requirements and architecture for ubiquitous data access. SIGMOD Rec. 33, 4, December, 2004.
    [12]Amer A., and Long D. D. E. Noah: Low-cost file access prediction through pairs. In Proceedings of the 20th IEEE International Performance, Computing and Communications Conference, April, 2001.
    [13]Amer, A., Long, D. D., Paris, J., and Burns, R. C. File access prediction with adjustable accuracy. In Proceedings of the Performance, Computing, and Communications Conference, 2002.
    [14]Gary A. S. Whittle, Jehan-François Pâris, Ahmed Amer, Darrell D. E. Long, and Randal Burns, Using Multiple Predictors to Improve the Accuracy of File Access Predictions, Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies, April 07-10, 2003.
    [15]Boukerche A. and Al-Shaikh R. A., A performance analysis of a cache-based file prediction protocol for mobile file systems. In Proceedings of the ACM international Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks ACM, 2006.
    [16]Boukerche A., Al-Shaikh R., and Marleau B., Disconnection-Resilient File System for Mobile Clients. In Proceedings of the the IEEE Conference on Local Computer Networks 30th Anniversary, LCN. IEEE, 2005.
    [17]Gitzenis S. and Bambos N., Joint Transmitter Power Control and Mobile Cache Management in Wireless Computing. IEEE Transactions on Mobile Computing 7, 4, April, 2008.
    [18]Pering T., Agarwal Y., Gupta R., and Want R., CoolSpots: reducing the power consumption of wireless mobile devices with multiple radio interfaces. In Proc. Int. Conf. Mobile Systems, Applications and Services, June 2006.
    [19]Yuvraj Agarwal, Curt Schurgers, and Rajesh Gupta, Dynamic power management using on demand paging for networked embedded systems, Proceedings of the 2005 conference on Asia South Pacific design automation, January 18-21, 2005.
    [20]FUSE (file system in Userspace), http://fuse.sourcefore.net/
    [21]Beagle (Linux Desktop search engine),
    http://beagle-project.org/Main_Page
    [22]Apache Lucene, http://lucene.apache.org/
    [23]Gerard Salton, and Christopher Buckley, Term-weighting approaches in automatic text retrieval, Information Processing and Management: an International Journal, v.24 n.5, p.513-523, 1988.
    [24]SQLite (SQL database engine), http://www.sqlite.org/
    [25]T. K. Proctor, Evolution to 3G services: provision of 3G services over GERAN (GSM/EDGE radio access network). In Proceedings of the 4th International Conference on 3G Mobile Communication Technologies, June 2003.
    [26]Vikrant A. Chitre and John N. Daigle. Performance of IP-based services over GPRS. IEEE Transactions on Computers, June 2003.
    [27]The Porter Stemming Algorithm.
    http://tartarus.org/~martin/PorterStemmer/
    [28]M. Ng, M. Vijayaraghavan, N. Dave, Arvind, G. Raghavan and J. Hicks, From WiFi to WiMAX: Techniques for IP Reuse across Different OFDM Protocols, Proceeding of 5th ACM-IEEE International Conference on Formal Methods and Models for Codesign, Nice, 2007.
    [29]George H. Forman , John Zahorjan, The Challenges of Mobile Computing, Computer, v.27 n.4, p.38-47, April, 1994.

    下載圖示 校內:2009-08-18公開
    校外:2010-08-18公開
    QR CODE